[71004] in North American Network Operators' Group
Re: IT security people sleep well
daemon@ATHENA.MIT.EDU (Edward B. Dreger)
Fri Jun 4 04:03:18 2004
Date: Fri, 4 Jun 2004 08:02:30 +0000 (GMT)
From: "Edward B. Dreger" <eddy+public+spam@noc.everquick.net>
To: nanog@merit.edu
In-Reply-To: <20040603212603.DFA7210E3C@gateway.wvi.com>
Errors-To: owner-nanog-outgoing@merit.edu
JS> Date: Thu, 3 Jun 2004 14:26:01 -0700
JS> From: Jeff Shultz
JS> I wonder if they asked the people using Telnet if they were
JS> using over the internet - or inside a corporate intranet,
JS> shielded from the outside?
Good to know that malicious things are always on the other side
of the router. I must be hallucinating when I encounter pwned
boxes with sniffers running inside of a network. Everyone
restricts MAC addresses at their switches. Nobody is vulnerable
to cable taps, wireless sniffing, ICMP redirects, or any other
trickery.
Sarcasm aside, I don't think being shielded from the outside
makes that much difference. It's foolish to assume that a
corporate intranet is squeaky clean.
Eddy
--
EverQuick Internet - http://www.everquick.net/
A division of Brotsman & Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita
_________________________________________________________________
DO NOT send mail to the following addresses :
blacklist@brics.com -or- alfra@intc.net -or- curbjmp@intc.net
Sending mail to spambait addresses is a great way to get blocked.